home home
Other Sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo Internal Documentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
Sign In
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Aurora Attack Surface Management (Aurora ASM)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo
Internal Documentation
Sign In

Active Response, Log Forwarding, and Security Monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

Active Response, Log Forwarding, and Security Monitoring
  • Cloud Detection and Response Integrations
    • Cloud Detection and Response Overview
    • Cloud Detection and Response Integrations
    • Configure Abnormal Cloud Email Security
    • Configure Amazon Web Services (AWS)
    • Configure Auth0
    • Configure Box
    • Configure Cato SSE 360
    • Configure Cisco Duo
    • Configure Cisco Meraki
    • Configure Cisco Secure Email
    • Configure Cisco Umbrella
    • Configure CyberArk
    • Delinea
    • Configure Google Cloud Platform (GCP)
    • Configure Google Workspace
    • Configure iManage Threat Manager
    • Configure JumpCloud Directory Insights
    • Configure Microsoft 365
      • Configure Microsoft 365 - Deployment Application
      • Configure Microsoft 365 - Manual
      • Refresh Microsoft 365 Credentials
    • Configure Microsoft Azure
    • Configure Microsoft Defender XDR
    • Configure Microsoft Entra ID
    • Configure Mimecast
    • Configure Netskope
    • Configure Okta
    • Configure OneLogin
    • Configure Oracle Cloud Guard
    • Configure PAN Prisma Access
    • Configure PingOne
    • Configure Proofpoint Targeted Attack Protection (TAP)
    • Configure Salesforce
    • Configure Wiz
    • Configure Zscaler Internet Access (ZIA) – Cloud
Home ▸ Active Response, Log Forwarding, and Security Monitoring ▸ Cloud Detection and Response Integrations
Share this page
  • LinkedIn
  • X
  • Facebook
  • Email
Print page

Configure Microsoft 365 for Arctic Wolf monitoring

You can configure Microsoft 365® to send the necessary logs to Arctic Wolf® for security monitoring using one of these methods:

  • Deployment application — See Configure the Arctic Wolf Microsoft 365 deployment application.
  • Manual — See Configure Microsoft 365 for Arctic Wolf monitoring manually.
Cloud Detection and Response (CDR) Integrations and Log Forwarding Managed Detection and Response (MDR) Installation or Configuration Public

Last updated: May 4, 2026

Previous Configure JumpCloud Directory Insights Next Configure Microsoft 365 - Deployment Application
Arctic Wolf Help Documentation
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.
Privacy Policy Terms of Use Cookie Policy Accessibility Statement Information Security Sustainability Statement